Behavior-based intrusion detection in mobile phone systems
Journal of Parallel and Distributed Computing - Problems in parallel and distributed computing: Solutions based on evolutionary paradigms
Development of Personal Authentication System using Fingerprint with Digital Signature Technologies
HICSS '01 Proceedings of the 34th Annual Hawaii International Conference on System Sciences ( HICSS-34)-Volume 9 - Volume 9
Fixed-point GMM-based speaker verification over mobile embedded system
WBMA '03 Proceedings of the 2003 ACM SIGMM workshop on Biometrics methods and applications
Advances in Minimum Description Length: Theory and Applications (Neural Information Processing)
Advances in Minimum Description Length: Theory and Applications (Neural Information Processing)
Geoinformatica
A model for enriching trajectories with semantic geographical information
Proceedings of the 15th annual ACM international symposium on Advances in geographic information systems
Behavioral detection of malware on mobile handsets
Proceedings of the 6th international conference on Mobile systems, applications, and services
Understanding mobility based on GPS data
UbiComp '08 Proceedings of the 10th international conference on Ubiquitous computing
Mobi-watchdog: you can steal, but you can't run!
Proceedings of the second ACM conference on Wireless network security
Mining interesting locations and travel sequences from GPS trajectories
Proceedings of the 18th international conference on World wide web
ACM Computing Surveys (CSUR)
A Hybrid Prediction Model for Moving Objects
ICDE '08 Proceedings of the 2008 IEEE 24th International Conference on Data Engineering
Implicit User Re-authentication for Mobile Devices
UIC '09 Proceedings of the 6th International Conference on Ubiquitous Intelligence and Computing
Mining trajectory profiles for discovering user communities
Proceedings of the 2009 International Workshop on Location Based Social Networks
From trajectories to activities: a spatio-temporal join approach
Proceedings of the 2009 International Workshop on Location Based Social Networks
Measuring serendipity: connecting people, locations and interests in a mobile 3G network
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
On the levy-walk nature of human mobility
IEEE/ACM Transactions on Networking (TON)
A cloud-based intrusion detection and response system for mobile phones
DSNW '11 Proceedings of the 2011 IEEE/IFIP 41st International Conference on Dependable Systems and Networks Workshops
A probabilistic diffusion scheme for anomaly detection on smartphones
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
The minimum description length principle in coding and modeling
IEEE Transactions on Information Theory
Hi-index | 0.00 |
This paper addresses the problem of efficient intrusion detection for mobile devices via correlating the user's location and time data. We developed two statistical profiling approaches for modeling the normal spatio---temporal behavior of the users: one based on an empirical cumulative probability measure and the other based on the Markov properties of trajectories. An anomaly is detected when the probability of a particular (location, time) evolution matching the normal behavior of a given user becomes lower than a certain threshold, determined by controlling the recall rate of the model of the normal user's behavior. We used compression techniques to reduce processing overhead while maintaining high accuracy. Our evaluation based on the Reality Mining and Geolife data sets shows that the proposed system is capable of detecting a potential intrusion within 15 min and with 94 % accuracy.